On Wed, Mar 9, 2016 at 4:01 PM, Jeremy Rowley <[email protected]>
wrote:

> Restricting by root isn't feasible. The browsers limit the number of root
> CAs each CA can have.


[citation-needed] (?)

I'm not aware of any such restriction in the Mozilla policy.  And in fact,
this discussion seems like a good reason for removing one if there is.

--Richard


> , meaning most CAs chain Code Signing and Client chain
> to the same root as server certs.
>
> -----Original Message-----
> From: dev-security-policy
> [mailto:dev-security-policy-bounces+jeremy.rowley
> [email protected]
> .org] On Behalf Of Jakob Bohm
> Sent: Monday, March 7, 2016 4:50 PM
> To: [email protected]
> Subject: Re: More SHA-1 certs
>
> On 07/03/2016 11:36, Rob Stradling wrote:
> > On 04/03/16 23:14, Matt Palmer wrote:
> >> On Fri, Mar 04, 2016 at 09:19:36PM +0000, Rob Stradling wrote:
> >>> Maybe we need to take a different approach that ignores the
> >>> end-entity certificate profile completely.  How about we propose
> that...
> >>>
> >>>    - An X.509 certificate is in scope for the BRs if it's signed by
> >>> an Issuing CA that is in scope.
> >>>
> >>>    - An Issuing CA is in scope if:
> >>>      i) it chains to a Root Certificate that is trusted for server
> >>> authentication
> >>
> >> You'll want to describe *who* trusts the root.
> >
> > Hi Matt.  I thought somebody might point that out.  Sorry for my
> > handwaviness.  ;-)
> >
> > "*who* trusts" is indeed important, but it wasn't the aspect of the
> > scope problem I was trying to solve with my previous post.
> >
> >> I trust lots of private PKI
> >> roots for server authentication in my own gear, but they're never
> >> going mainstream.
> >>
> >> Perhaps "it chains to a Root Certificate that is trusted, or is
> >> intended to be trusted, by one or more Browser members of the
> >> CA/Browser Forum for server authentication"?  The "intended to be
> >> trusted" is to make sure that candidates for browser trust programs
> >> know they're on the hook, too.
> >>
> >> - Matt
> >
>
>
> How about "It chains to a Root certificate claiming compliance with
> these BRs".   This is a clear condition with a well-defined and
> controllable meaning.  Either a CA root is intended as a CAB/F compliant
> root submitted to all the relevant browser related trust lists and thus
> would seek compliance with the BR, or that root (even if operated by the
> same entity as a BR compliant root) doesn't do that.
>
> And while we are at it, we also need to look at what the scope rules would
> be for e-mail and code certificates and CAs.  E-mail because of
> Thunderbird.
>
> Code certificates because while the Mozilla corporate folks have abandoned
> the concept, many other people have not, and this Mozilla forum remains the
> primary contact point between the open source community and the CAs,
> partially because many Open Source distributions (including at least Debian
> and Ubuntu) use the Mozilla CA list as the basis for their system-wide
> general purpose certificate stores.
>
>
>
>
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
> Transformervej
> 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10 This public discussion
> message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to